Loading…
Loading…
Loading…
Methodology for Searching for the Dependence Between Data Defensiveness and Volume of Social Network Evolution
Volodymyr, Akhramovych, Svitlana, Lehominova, Oleh, Stefurak, Vadym, Akhramovych, Sergii, Chuprun
Published in International journal of computer network and information security (08.12.2024)
Published in International journal of computer network and information security (08.12.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
ANTMAC: Addressing Novel Congestion Technique Hybrid Model for Collision Control in IoT-based Environments using Contention-based MAC Protocol
Shial, Rabindra Kumar, Rath, Premanshu, Patnaik, Sudhir Ranjan, Nayak, Sarat Chandra, Ghugar, Umashankar
Published in International journal of computer network and information security (08.12.2024)
Published in International journal of computer network and information security (08.12.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Machine Learning-based Distributed Denial of Service Attacks Detection Technique using New Features in Software-defined Networks
Gadallah, Waheed G., Omar, Nagwa M., Ibrahim, Hosny M.
Published in International journal of computer network and information security (08.06.2021)
Published in International journal of computer network and information security (08.06.2021)
Get full text
Journal Article
Loading…
Loading…
A Feed-Forward and Pattern Recognition ANN Model for Network Intrusion Detection
Iqbal, Ahmed, Aftab, Shabib
Published in International journal of computer network and information security (01.04.2019)
Published in International journal of computer network and information security (01.04.2019)
Get full text
Journal Article
Loading…
Parameter Estimation of Cellular Communication Systems Models in Computational MATLAB Environment: A Systematic Solver-based Numerical Optimization Approaches
Isabona, Joseph, Akinwumi, Sayo A., Arijaje, Theophilus E., Ituabhor, Odesanya, Imoize, Agbotiname Lucky
Published in International journal of computer network and information security (08.06.2024)
Published in International journal of computer network and information security (08.06.2024)
Get full text
Journal Article
Loading…
Loading…
Quality of Experience Improvement and Service Time Optimization through Dynamic Computation Offloading Algorithms in Multi-access Edge Computing Networks
Myyara, Marouane, Lagnfdi, Oussama, Darif, Anouar, Farchane, Abderrazak
Published in International journal of computer network and information security (08.08.2024)
Published in International journal of computer network and information security (08.08.2024)
Get full text
Journal Article
Loading…
BSHOA: Energy Efficient Task Scheduling in Cloud-fog Environment
Medishetti, Santhosh Kumar, Karri, Ganesh Reddy
Published in International journal of computer network and information security (08.08.2024)
Published in International journal of computer network and information security (08.08.2024)
Get full text
Journal Article
Loading…
Disinformation, Fakes and Propaganda Identifying Methods in Online Messages Based on NLP and Machine Learning Methods
Vysotska, Victoria, Przystupa, Krzysztof, Chyrun, Lyubomyr, Vladov, Serhii, Ushenko, Yuriy, Uhryn, Dmytro, Hu, Zhengbing
Published in International journal of computer network and information security (08.10.2024)
Published in International journal of computer network and information security (08.10.2024)
Get full text
Journal Article
Loading…
Path Loss Analysis of ZigBee for Smart Meter Network Deployment in NAN
Samarakoon, Sehan, Dissanayake, Maheshi B, Liyanage, Kithsiri M, Navaratne, Sudheera, Jayasinghe, Chirantha, Illangakoon, Prabhath
Published in International journal of computer network and information security (08.10.2024)
Published in International journal of computer network and information security (08.10.2024)
Get full text
Journal Article
Loading…